×
Register Here to Apply for Jobs or Post Jobs. X

Security Architect; Data

Job in City of Rochester, Rochester, Monroe County, New York, 14602, USA
Listing for: Unlimited Technology, Inc.
Full Time position
Listed on 2026-03-01
Job specializations:
  • IT/Tech
    Cybersecurity, Systems Engineer
  • Engineering
    Cybersecurity, Systems Engineer
Salary/Wage Range or Industry Benchmark: 80000 - 100000 USD Yearly USD 80000.00 100000.00 YEAR
Job Description & How to Apply Below
Position: Security Architect (Data)
Location: City of Rochester

Come join our team! At Unlimited Technology, we are committed to our company's core values of Passion, Collaboration, Innovation and Adaptability. With offices throughout the United States, we are a premier cyber and physical security specialty contractor, and we are growing at a rapid pace. We have a wide range of talented and experienced individuals that deliver cutting edge technology solutions to meet our customers’ ever-changing needs.

We secure the facilities and networks of the world’s leading brands and critical infrastructure and are recognized leaders in the physical and IT security, cyber, and managed services industries. UT offers a rewarding career, great benefits, and the chance to learn and work with ground-breaking technology and premier clients.

Chief Security Architect (Data) Role Summary

The Chief Security Architect (Data) onsite 5 days a week in Rochester, NY is the senior technical authority responsible for defining and governing the cybersecurity architecture for energy utility data, network, and grid‑adjacent environments, including Advanced Metering Infrastructure (AMI), Distributed Energy Resources (DER), and private utility WANs. This role requires deep expertise in large‑scale networking (switching, routing, WAN, transport) combined with cybersecurity architecture and risk assessment, with a strong understanding of IT/OT boundaries, grid modernization, and utility operational risk.

The position plays a critical role in ensuring secure, resilient, and compliant architectures that support grid reliability, customer data protection, and regulatory expectations.

Core Responsibilities Data and Networking Security Architecture
  • Define and maintain the enterprise security architecture for:
    • Utility data centers
    • Private utility WANs
    • AMI head‑end and meter data management systems (MDMS)
    • DER and grid‑edge integration platforms
  • Establish architectural standards that enforce:
    • IT/OT separation
    • Secure utility demarcation points
    • Controlled ingress/egress between enterprise, AMI, and operational zones
AMI & DER Architecture Oversight
  • Lead security architecture reviews for:
    • AMI networks (RF mesh, cellular, fiber‑backed aggregation)
    • AMI head‑end systems and MDMS platforms
    • DER integrations (solar, storage, EV charging, microgrids)
  • Ensure secure integration of:
    • Third‑party DER aggregators
    • Cloud‑hosted AMI and analytics platforms
  • Define security controls to mitigate:
    • Lateral movement from AMI into enterprise or OT systems
    • Unauthorized DER command and control
    • Supply‑chain and vendor access risks
Networking, WAN & Transport Architecture
  • Provide hands‑on architectural leadership for:
    • Datacenter switching and routing
    • Utility private WAN and carrier connectivity
    • Inter‑data‑center and regional transport networks
  • Design and review architecture leveraging:
    • Cisco Nexus (NX‑OS, EVPN, VXLAN, ACI)
    • Nokia (SR OS, IP/MPLS, Service Routers)
    • Ciena (optical transport, DCI, coherent optics)
  • Embed security into:
    • BGP, OSPF, IS‑IS, MPLS, EVPN
    • AMI backhaul and aggregation networks
    • Utility‑owned and leased transport circuits
Cybersecurity Architecture Reviews & Risk Analysis
  • Conduct formal cybersecurity architecture reviews for:
    • AMI expansions
    • DER onboarding initiatives
    • New private and cloud connectivity
  • Perform:
    • Threat modeling specific to utility attack scenarios
    • Attack‑path and lateral movement analysis
    • Control effectiveness assessments
  • Identify architectural risks related to:
    • Improper zone termination
    • Inadequate segmentation
    • Over‑trust of vendor‑managed systems
  • Provide risk‑based remediation guided by operational realities.
Segmentation, Zero Trust & Monitoring
  • Define segmentation strategies aligned to utility environments:
    • Enterprise IT
    • AMI / Grid Edge
    • OT / Control Systems
  • Ensure security architectures support:
    • Zero Trust principles where applicable
    • Strong identity, authentication, and authorization
  • Define monitoring and visibility requirements for:
    • AMI traffic
    • DER command‑and‑control paths
    • Inter‑zone communications
  • Ensure integration with:
    • SIEM
    • Network Detection & Response (NDR)
    • Flow telemetry (Net Flow, IPFIX)
Regulatory & Stakeholder Engagement
  • Support compliance and audit activities related to:
    • Utility cybersecurity regulations and standards
    • Internal and external…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary